Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
operating systems
biblio
Analysis of Fileless Malware and its Evasive Behavior
Submitted by grigby1 on Thu, 03/04/2021 - 2:45pm
static and advanced malware analysis
malware threats
Memory Analysis
Metrics
operating systems
Payloads
PowerShell (PS)
pubcrawl
resilience
security
malware
Task Analysis
tools
Trojan horses
white box
White Box Security
Windows Management Instrumentation (WMI)
Windows operating system
Windows Operating System Security
computer viruses
privacy
Predictive Metrics
Human behavior
Resiliency
Advance Volatile Threat
Advance Volatile Threat (AVT)
composability
computer systems
Malware Analysis
different malware
evasion
executable malware
file-based malware
fileless malware
Instruments
internet
invasive software
biblio
A Framework for Collecting and Analysis PE Malware Using Modern Honey Network (MHN)
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
PE malware
malware PE file type formats
malware samples
Metrics
modern honey network
operating systems
operating systems (computers)
Payloads
PE file format
malware information
resilience
security
security threat
static analysis techniques
Windows operating system
Windows Operating System Security
windows-based malware
static analysis
malware detection
malware collection technique
Malware Analysis
malware
learning (artificial intelligence)
invasive software
file format information
feature extraction
dynamic analysis techniques
Computers
computer viruses
Resiliency
composability
Human behavior
pubcrawl
biblio
Analysis of USB Based Spying Method Using Arduino and Metasploit Framework in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:44pm
Software
peripheral interfaces
plug and play functionality
powershell
pubcrawl
resilience
Resiliency
reverse shell
reverse shell backdoor
operating systems (computers)
spying attacks
Universal Serial Bus
USB attack
USB device
Webcam
Webcams
Windows Operating System Security
Keyboards
security
Arduino
backdoor reverse shell
composability
computer network security
exploitation
Hardware
invasive software
Windows operating system
malware
Metasploit Framework
Metrics
microcontrollers
microphone device
operating system
operating systems
biblio
Federated TONİoT Windows Datasets for Evaluating AI-Based Security Applications
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
privacy
Windows operating systems
Windows Operating System Security
Windows operating system
virtualization privacy
Virtual machining
virtual machine security
virtual machine
testbed
security
Resiliency
resilience
pubcrawl
Linux Operating System Security
operating systems
Metrics
Intrusion Detection
Internet of Things
Human behavior
Federated datasets
data privacy
Computer crime
composability
Cloud Computing
AI-based security applications
biblio
Implementation and Analysis of Keyboard Injection Attack using USB Devices in Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:43pm
Universal Serial Bus
powershell script
pubcrawl
resilience
Resiliency
security
security of data
Software
Turning
powershell
universal serial bus devices
USB
USB devices
user interfaces
Windows
Windows 10 operating system attacks
Windows operating system
Windows Operating System Security
keylogger
Arduino Pro Microdevice
composability
Firewalls (computing)
Hardware
internet
keyboard injection attack analysis
keyboard injection attack implementation
Keyboards
Arduino
keylogger program
keystroke analysis
Metrics
microcomputers
Microsoft Windows (operating systems)
operating systems
peripheral interfaces
biblio
System of Collection and Analysis Event Log from Sources under Control of Windows Operating System
Submitted by grigby1 on Thu, 03/04/2021 - 2:42pm
Metrics
Windows Operating System Security
universal system
the monitoring center
system monitoring
Servers
security of data
security information
Resiliency
resilience
received events
pubcrawl
Protocols
operating systems (computers)
operating systems
monitoring events
Windows operating system
Information systems
information security
Industrial engineering
event-forwarding technology
event sources
event management
event log analysis
event log
event forwarding technology
event collector
domain controller
computer security
composability
analysis of incidents
security
biblio
Hardening Firefox against Injection Attacks
Submitted by grigby1 on Wed, 02/10/2021 - 1:22pm
real-world security vulnerabilities
user interfaces
Web pages
Browser Security
information retrieval
CSS
Firefox
Hardening
injection attacks
HTML
Universal Cross-site Scripting
untrusted Web content
user interface
Web browsers display content
web security
Web security model
Cross Site Scripting
online front-ends
security
pubcrawl
Human behavior
resilience
Resiliency
Scalability
internet
Runtime
security of data
JavaScript
World Wide Web
authoring languages
Browsers
operating systems
Web sites
hypermedia markup languages
biblio
Policy-Based Access Control for Robotic Applications
Submitted by grigby1 on Thu, 12/17/2020 - 1:38pm
privacy leakage
Service robots
security aspects
security
ROS
robots
robotic systems
robotic applications
Robot sensing systems
robot programming
robot operating systems
Robot Operating System
Resiliency
resilience
pubcrawl
Access Control
policy-based governance
Policy-based access control
permissions
operating systems
modern robots
Human Factors
Human behavior
extended policy-based access control model
data privacy
basic permission control mechanism
authorisation
Adaptation models
access control mechanism
biblio
Real-Time Attack Detection on Robot Cameras: A Self-Driving Car Application
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
real-time attack detection
unsupervised anomaly detection method
telecommunication security
Service robots
self-driving cars
security of data
security assessment
security
ROS
Robot vision systems
robot operating systems
Robot Operating System
robot cameras
Robot
Resiliency
resilience
Attack detection
pubcrawl
policy-based governance
Perturbation methods
operating systems
object detection
mobile robots
intrusion detection system
images processing
images comparisons
image matching
Human Factors
Human behavior
car application
Cameras
automotive electronics
biblio
ROSploit: Cybersecurity Tool for ROS
Submitted by grigby1 on Thu, 12/17/2020 - 1:37pm
ROS
resilience
Resiliency
robot operating systems
robot programming
robotic operating system security research
robotic systems
robotics
robots
Reconnaissance
ROS systems
ROSploit
security
security of data
security vulnerabilities
threat model
tools
Analytical models
public domain software
pubcrawl
preliminary state
policy-based governance
operating systems (computers)
operating systems
offensive tool
modular two-pronged offensive tool
Human Factors
Human behavior
foundational knowledge
cybersecurity tool
Cybersecurity
control engineering computing
Biological system modeling
« first
‹ previous
…
7
8
9
10
11
12
13
14
15
…
next ›
last »